You have attracted plenty of attention with your DDOS attacks against the MPAA, IFPI, ACS:Law, Davenport Lyons, the US Copyright Office, and so on. Downing those sites is an open challenge to the Copyright Nazis, a glove slapped in the face of those who would restrict our beloved internets.

However,attacking websites doesn’t accomplish much in and of itself. Sure, in the course of the APACOR and ACS:Law attacks you managed to snatch and publicize some juicy internal data. In the ACS:Law case, that will hopefully lead to the firm’s well-deserved demise. Good on you! But the practice of attacking and downing or defacing websites yields only a cosmetic win. For the real lulz, you’ve gotta go after infrastructure, the machines and networks that make what these despicable organizations do possible.

So, the next time you’re priming your Low Orbit Ion Cannons, consider alternate targets: routers, DNS servers, email gateways, firewalls, proxy servers — basically, anything exposed to the public internets which directly affects the organization’s functioning. With a wee bit of probing and a wee bit of planning, you’ll be much more effective.